Professional Documents
Culture Documents
Police Intelligence PDF
Police Intelligence PDF
1
2
3
SUN TZU
“If you know your enemy and know
yourself, you need not fear the results of
hundred battles.
5
Moses
one of the first
recorded formalized
intelligence efforts,
with format can be
found in the Holy
Bible (Numbers
13:17).
◦ He sent 12 leaders of
Israel to spy out the
land of Canaan
(Numbers 13:17-21).
6
Holy Bible Book of Numbers 13:17
“And Moses sent them to spy out the land of
Canaan and said unto them, get you up this way
southward, and go up into the mountain; and see
the lands, what it is; and the people that dwell
therein, whether they are strong or weak, few or
many; and what the land they dwelt in, whether
in tents, or in strongholds; and what land is;
whether it be fat or lean, whether there be wood
therein, or not. And be of good courage and bring
of the fruit of the land.”
7
THE 12 MEN SENT BY MOSES TO SPY CANAAN-heads of
the children of isreal
9
Delilah
She was an
impromptu
intelligence agent of
the Philistines. She
allowed Philistine
spies to hide in her
house (Judges 16:9)
and used her
femininity to gain
intelligence from a
powerful enemy.
10
Sun Tzu
12
Alexander The Great
While marching in
Asia, he investigated
all the letters and the
detection of the
malcontents whether
the legitimate cause
were exposed.
13
Sertorius, Quintus
A possessor of the
white fawn that tried
to follow Polyaenus
everywhere.
The Fawn was used as
intelligence agent.
His intelligence agents
credited their
information to the
supernatural power of
animals.
14
Akbar
The “Great Mogul”
and sagacious master
of Hindustan who
employed more than
four thousand agents
for the sole purpose
of bringing him the
truth that his throne
might rest upon him.
15
Genghis Khan
Born in Pakistan
He instructed his generals to
send spies and used prisoners
as sources of information.
The leader of the so-called
Mongol conquerors and used
effective propaganda by
spreading rumors of Mongol
terror.
He has 36 wives.
16
Frederick, The Great
“The father of
organized military
espionage”
18
He divided his agents into four
classes:
Common spies- recruited among poor folk,
glad to earn small sum or to accommodate a
military officer.
Double spies – the low informers and unreliable
renegades of value chiefly in spreading false
information to the enemy.
Spies of consequences – couriers and
noblemen, staff officers, and kindred conspirators,
invariably requiring substantial bribe or bait.
4) Intimidated Spies -persons who are forced
to undertake espionage against their will.
19
Hannibal
He roamed around
the city often
disguising as beggar
to gather first hand
information.
20
Gaius Julius Caesar
During his time, his
staff of each legion
includes ten
“speculators” who
served as
information-
collecting agency.
22
“speculators”
were the first They used carrier
intelligence pigeons that made
personnel to appear possible the amazing
definitely in a military speed with which
organization. intelligence of
Information Imperial Rome was
collecting agency transmitted.
Military success was
aided by
communication
23
Karl Schulmeister
Napoleon’s military
secret service and
Napoleon’s eyes.
Under a cover role,
he was able to
infiltrate the Austrian
General Staff and
studied the
characters of the
Generals.
24
Washington, George
He, as grand master, 1st President of USA
mobilized the free
A man who is a
masons of the member of a
colonies at the large secret
society.
outbreak of the Freemasons
American war of promise to help
independence. each other, and
use a system of
secret signs in
order to
Organization where Rizal recognize each
and Luna are members. other.
Symbolizes solidarity
26
Richelieu
He introduced the
network of covert
collectors who
transmitted prompt
and accurate
information to Paris
regarding the
activities of the
rebels and dissidents
of the kingdom.
27
Napoleon Bonaparte
“One spy in the He maintained
right place is military intelligence
worth 20,000 men and secret political
service all over
in the field” Europe.
Spy against spy was
of high proportion
during his time.
28
Bureau of Intelligence Topographic Bureau
32
Joseph Fouche
“Father of modern Trained for the
political priesthood, he never
espionage” took orders,
instead he became
Created a network
teacher
of agent and his
assistance founded Become the most
the modern system respected
of spying on spies, intelligence director
which later known as in french history.
counter espionage.
33
Gen. William Donovan
Pres. Roosevelt
established the
Office of Strategic
Services (OSS) with
Donovan as in-
charged.
“Father of
American
Intelligence”
34
Office of Strategic Services (OSS)
The builder of a
central intelligence
system and
considered as
forerunner of the
CIA.
36
Edward I, King of England
he organized the
profession “State
Informer”
37
Intelligence and the
World War
38
WORLD WAR I
39
Aircraft
was
introduced as
a tool of
conducting
aerial
reconnaissance
40
“Agent Provocateur”
was employed by the Is a person who is
Russians for the employed by the
purpose of internal government or the
security and political police
repression. To encourage certain
groups of people to
Spying was always break the law
the specialty of the So they can arrest
Russians. them or
Make them lose
public support
41
German Intelligence
gained a high Offensive- is a
reputation for carefully planned
offensive attack made by a
effectiveness large group of
throughout Europe soldiers
but declined at the
outset of the war.
42
British Intelligence
succeeded greatly by Censorship- officially
means of censorship examine letters and
and its Code Room cut out any
combined with information that is
skillful use of covert regarded as secret.
agents.
43
US
expanded their Naval
Intelligence wherein
Domestic
Counterintelligence
became a principal activity.
44
Dolphins
The first
animal
used by
the
American
to spy.
45
US THREE (3) BRANCHES OF
INTELLIGENCE
46
1. Positive Branch
Has the function of
collecting evaluating
and disseminating
intelligence.
Prepare situation
estimate and
translate documents.
47
2. Negative Branch
Counterintelligenc
e functions:
◦ investigate
disloyalty and
sedition,
investigate graft
and fraud in
organization.
48
3. Geographic Branch
Produces maps,
photographs and
terrain studies
49
INTELLIGENCE DURING
WORLD WAR II
50
German Intelligence
started the war with
the world’s best
organized intelligence
service through
advance preparation
of intelligence
accompanied by
troop movements.
51
Japanese Intelligence
failed because it was
not provided with
sufficient number of
trained personnel to
assemble and evaluate
the mass of materials
which were collected
although Japanese
Intelligence was
involved in short war
and defensive in
nature.
52
British Intelligence
Its achievement was through penetration
the delay in the use and technical
of German V-Bomb. intelligence,
The operation was
conducted with the they discovered
OSS and Peenemϋndé, the V2
guided missile
research project of
Nazi Germany.
53
Notable Intelligence Organization
1. The Central Intelligence Agency (CIA) of
the United States of America.
Established in
1909 as an internal
departments under the control of Secret
Service Bureau.
58
4. ha
Mossad le-Modin ule-Tafkidim
Meyuhadim (MOSSAD) of Israel.
Literallymeans
The Institute for Intelligence and Special
Tasks.
It was formally established in 1951 and
called “THE INSTITUTE”
60
Other Active Intelligence
Agencies
◦ RAW (India) – Research and Analysis Wing
◦ CSIS (Canada) – Canadian Security Intelligence
Service
◦ ASIS (Australia) – Australian Secret Intelligence
Service
◦ BND (Germany) - Bundesnachrichtendienst
◦ CNI ( Spain) – Centro Nacional de Inteligencia
◦ DGSE ( France) – Direction Generale de la Securite
Exterieure
◦ ISI ( Pakistan) – Inter – Service Intelligence
◦ MSS ( China) – Ministry of State Security
◦ GID (Jordan) – General Intelligence Department
◦ British Secret Service – Great Britain
◦ KCIA –Korean Central Intelligence Agency
◦ Britain: Scotland Yard, London,
Metropolitan Police Force
Note:
The counterpart of these
intelligence organizations in the
Philippines is the National
Intelligence Coordinating
Agency (NICA) which is under the
Office of the National Security
Adviser
NATURE OF INTELLIGENCE
FUNCTIONS
65
INTELLIGENCE
is the end product resulting from the
collection, evaluation, analysis,
integration and interpretation of all
available information
which may have immediate or potential
significance to the
development and execution of plans,
policies and programs.
66
Are fundamental guides to action
PRINCIPLES OF INTELLIGENCE
67
The Principle of Objectivity
It is thoroughly and carefully planned.
◦ In intelligence, only the well-guided
succeed.
◦ It is a basic intelligence concept that there
should be unity between knowledge and
action.
◦ Purposeful and reasonable.
68
The Principle of
Interdependence
◦ Intelligence is artificially subdivided into
component elements to insure complete
coverage, eliminate duplication and to
reduce the overall task or manageable size.
◦ It is manageable
69
Principle of Continuity
◦ It is necessary that coverage be
continuous so that the shape of what
happens today could be studied in the light
of what happened before, which in turn
would enable us to predict the shape of
things to come.
70
Principle of Communication
Intelligence
adequate to their needs must
be communicated to all the decision-
makers in manner that they will
understand and from that will permit its
most effective use
71
Principle of Usefulness
◦ Intelligence is useless if it remains in
the minds, or in the files of its
collectors or its producers.
◦ The story must be told and it must
be told well.
72
Principle of Flexibility
ability to adapt to new situation
◦ intelligence must have the ability to change
or be changed according to circumstances.
◦ Hence, alternatives must be drawn.
73
Principle of Selection
Fits the needs of the commander because
of command responsibility
◦ In intelligence, it should be essential and
pertinent to the purpose at hand.
74
Principle of Timeliness
Intelligence
must be communicated to the
decision maker at the appropriate time
to permit its most effective use.
75
Principle of Security
Requires constant security measures
◦ Security is achieved by the measures
which intelligence takes to protect and
preserve the integrity of its activities.
Code of Omerta
76
CATEGORIES OF
INTELLIGENCE
77
NATIONAL Intelligence
◦ The total product of
intelligence developed
by all governmental
agencies
◦ that cover the broad
aspects of National
Security and
National Policy
NICA
78
DEPARTMENT Intelligence
Intelligence used by the various
departments for the
advancement of each
departments/agencies.
79
Department of National Defense
83
MILITARY intelligence
◦ This is used in the
preparation of
military policies,
plans and
programs. It
includes strategic
and combat
intelligence.
ISAFP
84
POLICE INTELLIGENCE
It refers to evaluated
and interpreted
information
concerning organized
crime and other
major police
problems.
Intelligence Group
(PNP)
PDEA
85
TECHNICAL INTELIGENCE
This concerns foreign
technical
developments, which
have a practical
military application and
the physical
characteristics,
performance,
capabilities, and
limitations of material Department of
and installation used trade and
by and for foreign.
commerce
A. MILITARY INTELLIGENCE
It refers to evaluated
and interpreted
information
concerning an actual
or possible enemy or
the operations
including weather
and terrain, together
with the conclusions
drawn there from.
87
THREE (3) BROAD FIELDS OF
MILITARY INTELLIGENCE:
88
STRATEGIC INTELLIGENCE
It is usually It does not have
descriptive in nature, immediate
accumulation of operational value
physical description
of personalities, but rather long range
modus operandi, etc. that may become
relevant to future
police/military
operations.
89
a. Political Intelligence – deals
with Domestic and Foreign affairs
and relation of government
operations;
Basic Principles of the
Government
Government Structures
Public Order and Safety
Subversion
Intelligence and Security
Organization
b. Economic Intelligence – deals with the extent and
utilization of Natural and Human resources to the
industrial potential of the Nations.
c.Transportation and Telecommunication
Intelligence - concerned with the operations
and facilities not only the Military but also the
Civilians.
d. Sociological Intelligence – deals with the
demographic and psychological aspects of groups of
people.
Population and Manpower
Characteristics of the People
Public Opinion – attitudes of the majority of the
people towards
matters of public
policy.
Education – based
on literacy rate
e. Biographical Intelligence – deals with
individual personalities who have actual
possession of power.
f. Geographical Intelligence – deals with the
natural as well as man made features of the
physical environment of man considered from the
point in view of military operations.
Location – military and economic importance
Size
Shape
Weather and Climate
g. Scientific Intelligence – deals with the
progress of the research and development as it
affects the economic and military potential of a
nation.
Line Intelligence (Tactical and Combat) – is
the intelligence required by the commander to
provide for planning and conduct of tactical
operation.This refers to knowledge of the People,
Weather, Enemy, and Terrain (PWET) used in
planning and conducting tactical and
administrative operation
in a counter insurgency.
A. People
living condition of the people
sources of income
education of the people
government livelihood of the people
103
Sabotage
Derived from the French word “Sabot”, a wooden
shoe worn by lower classes. It is the symbol of
rebellious farmers/revolutionaries.
105
2. ESPIONAGE
Act of spying.
106
Description of an Espionage
Agent
1. He is very dangerous adversary and his skills in
deception and his cunning should never be under
estimated.
2. He is usually a person of extensive training and
will be highly effective in gaining the confidence of
people and of extracting information of value to
be relayed to his employer or handler.
3. Even how well-trained an espionage agent he
might be, he is human like the saboteur and he
can be defeated in his own game if proper
methods and techniques are undertaken.
107
Some Methods Employed by
Espionage Agent
1. Stealing of information from employees.
2. Stealing information from records or other sources.
3. Using various methods of reproducing documents,
products, equipment or working models.
4. Using “front” as commercial concerns, travel agencies,
associations, business groups and other organizations to
obtain confidential information or data.
5. Using various form or threats to obtain information.
6. Using blackmail techniques by exposing intimate and
personal details concerning an individual or organization.
7. Picking or securing information in social and other
gatherings.
8. Penetration and operational tactics.
108
3. SUBVERSION
A systematic attempt to overthrow
or undermine a government or
political system by persons working
secretly from within.
109
Threats of Subversive Activity
1. It can be local or national in nature and
their mission is to undermine the
authority, weaken the organization, and
eventually take over. This can be in
business or any activity.
2. This can be in the form of rumor
mongering, propaganda, undermining
morale, and injecting defeatist attitudes,
and other emotional approaches.
3. It is an activity not easy to detect.
110
POLICE INTELLIGENCE
111
POLICE INTELLIGENCE
end product resulting from the collection,
evaluation, analysis, integration and
interpretation of all available information
regarding the
activities of criminal and other law
violators for the
purpose of affecting their arrest, obtaining
of evidence, and forestalling their plans to
commit crime.
112
Three Major Categories or
Types of Police Intelligence
113
STRATEGIC INTELLIGENCE
primarily long-range
in nature with little
or no immediate
practical value.
114
COUNTER-INTELLIGENCE
defending of the
organization against
its criminal enemies.
(Defensive Effort)
115
LINE INTELLIGENCE
of an immediate
nature and necessary
for more effective
police planning and
operations.
(Offensive Effort)
116
Functional Classification of Police Intelligence
1. Criminal Intelligence (CRIMINT)- production
of intelligence essential to the prevention of
crime, and the investigation, arrest and
prosecution of criminal offenders.
2. Internal Security Intelligence (INSIT)-
knowledge essential to the maintenance of
peace and order.
3. Public Safety Intelligence (PUSINT)-
knowledge essential to ensuring the protection
of lives and properties.
CONCEPTS IN POLICE
INTELLIGENCE
118
Information
Raw data or imagination,
unevaluated material and other sources
of every description
derived from
from which
observation, intelligence is
communication, produced.
reports,
rumors,
119
Source
where the
information is
obtained.
120
Open-source intelligence (OSINT) is a form of
intelligence collection management that involves
finding, selecting, and acquiring information from
publicly available sources and analyzing it to produce
actionable intelligence. Examples are:
Media: newspapers, magazines, radio,
television,
Web-based communities
Public data: government reports, official data such as
budgets, demographics, hearings, legislative debates,
press conferences, speeches,
Observation and reporting
Professional and academic: conferences, symposia,
professional associations, academic papers,
Close Sources (Covert/Close Source)
Surveillance
Casing
Elicitation
Surreptitious Entry
131
Mission
the focal point of the
intelligence operation;
a particular task given
to a person or group
to carry out;
or one which should
be accomplished.
132
INTELLIGENCE CYCLE
information is
Recording, Evaluation, disseminated to
Integration and the agency, unit or
Interpretation command to effect
DIRECTING or implement the
mission.
COLLECTING
DISSEMINATION MISSION
thecollecting agency
& USE
determines what
specific informationPROCESSING
is Selection of
to be collected, by collecting agency
whom and from
whom.
133
Phase 1 - Directing Collection
Effort
Directing
the Intel Staff Officer or Unit commander
determines the required or important
information relevant to mission.
Then these requirements will be
distributed to the
different collection agencies
by direction or by request.
Planning the Collection Effort
FIVE (5) Steps:
Determine intelligence requirements
area of operations
Issuance of Orders and requests and the selection of
144
THREE STAGES
PROCESSING:
1. Recording
2. Evaluation
3. Interpretation
145
1. Recording
it is the reduction of and the arranging of
information into this information into
writing or some groups of related
other form of items.
geographical
representation
146
Means of Recording Information
◦ Intelligence Journal
Contains chronological log of significant intelligence
activities
It includes all outgoing and incoming messages and
significant incidents concerning the operations of
intelligence agencies covering a specified period.
156
◦ Identification Files
Person
Numbers
Non – person
2. Evaluation
The determination of reliability of the
the pertinence of the source of or agency
information to the the accuracy of the
operation information; or
examination of raw
information to
determine
intelligence value.
159
Purposes of evaluation:
Pertinence (usefulness) – does it hold some
value to current operation? Is it needed
immediately?
Reliability (dependable) – judging the source
of information
Credibility (truth of information) – Is it
possible for the reported fact or event to have
taken place?
Is the report consistent within itself?
Is the report confirmed or corroborated by
information from different sources or agencies?
160
3. Interpretation
it is establishing the
meaning and
significance of the
information.
It involves the
following:
1. Analysis
2. Integration
3. Deduction
161
Analysis
◦ The determination of and drawing
significance of deductions about
information relative probable meaning of
to the information the evaluated
and information.
◦ intelligence already
known
162
Integration
◦ it is the ◦ intelligence to form a
combination of the logical feature
elements stated in ◦ or hypothesis for
assessment with enemy activities
other known ◦ or information of the
operational area and
information
characteristics of the
mission of the
command.
163
Deduction
◦ The formulation
of conclusions
from the theory
developed, tested
and considered
valid;
◦ determination of
effort and meaning
of the information.
164
EVALUATION GUIDES:
165
RELIABILITY OF INFORMATION
A Completely reliable
B Usually reliable
C Fairly reliable
E Unreliable
166
ACCURACY OF INFORMATION
1 Confirmed by other sources
2 Probably true
3 Possibly true
4 Doubtfully true
5 Improbable
Z Documentary
168
Phase 4 - Dissemination And Use
169
Dissemination And Use
Final phase of the to effect or
cycle. implement the
Processed mission.
information is
disseminated to the
agency, unit or
command
170
SUMMARY
PLANNING ( Most Crucial)
1. Determine Intel Requirements
2. Determine Intel Priorities
3. Determine Indicators
4. Determine Orders and Request
5. Select Collection Agencies
6. Supervise
SUMMARY
COLLECTION OF INFORMATION (
Most Dangerous)
1. Sources of Information
2. Agencies
SUMMARY
PROCESSING OF INFORMATION
( Most Tedious)
1. Recording
- Journal
- Workbook
- Intel Map
2. Evaluation
- Pertinence
- Reliability
- Accuracy
3. Integration
- Analysis
- Integration
- Deduction
SUMMARY
DISSEMINATION OF INFORMATION
( Most Critical)
1. Timely
2. Proper
OVERT METHOD
AND
COVERT METHOD
175
OVERT OR OPEN METHOD
The information of Aka “Overt
documents is Intelligence”
produced openly
without regards as to
whether the subject
of the investigation
becomes
knowledgeable of the
purpose for which it
is being gathered.
176
COVERT OR CLOSED
METHOD
The information is Aka “Covert
obtained without Intelligence”
knowledge of the
person against
whom the
information or
documents may be
used.
177
CASING
literally means used in intelligence
putting a thing, or operation – the
place in a case. continuous
monitoring of a place
or area at a given
period of time.
178
CASING
The reconnaissance or surveillance of a
building, place or area to determine its
suitability or vulnerability for intelligence
operation.
Purpose/ Objectives of Casing:
180
Types of Casing
External- the close observation and
clear description of an area, building or
installation, particularly its location,
approaches and exits, types of physical
barriers used, its immediate vicinity, etc.
Internal- the close observation and clear
description of the layout of a building, an
office or a room, etc.
181
METHODS OF CASING
182
Personal reconnaissance
the most effective
method and will
produce the most
essential information
since you know just
what you are looking Observing
for.
only in a short
span of time.
Not too long.
183
Map Reconnaissance
Terrain and
geographical
locations.
184
Research
much information PGI
can be obtained or
acquired through
research.
185
Prior Information
your unit and the
other units may have
file report that they
may provide you with
relevant information.
186
Hearsay
information usually
gain by the person
operating in the area
and performing
casing job.
187
SURVEILLANCE
The disguise or secret observation of a
place, person and vehicle for the purpose of
obtaining information concerning the identities
or activities of the subject.
SURVEILLANT – the person who maintains
the surveillance or performs the observation.
Kinds of Surveillance
1. Surveillance of place
2. Tailing or shadowing
3. Undercover investigation or roping
1. Surveillance of a place
Two types
a. Using a room in a nearby house or business
establishment and remain undercover
b. Remaining outdoors and posing as a person who
would normally conduct his business in such area
2. Shadowing or Tailing - The act of following a person
Shadowing or Tailing
Itis the act of following a person with the
following purposes:
◦ To detect evidence of criminal activities;
◦ To establish the associations of a suspect;
◦ To find a wanted person;
◦ To protect a witness or other persons;
This is the most effective
◦ To discover the associations, amusements and
habitssurveillance
of an employee whomethod
is considered for a
sensitive position; and
◦ To check loyalties of employees.
191
Methods of Shadowing/Tailing by
Foot
192
1. One Man shadow
commonly used
because of the
least number of
men involved.
It is the most
difficult but you
can decide on
your own.
193
2. Two Man Shadow
This is more One officer will
advantageous follow the subject
because it permits and the other will
immediate change keep abreast or on
and are less likely to the opposite side of
be recognized. the street.
194
3. Three Man Shadow or ABC
Method
A is closest to subject S. He follows S at a
distance depending on the pedestrian
traffic.
B follows A about the same distance
between A and S.
B and C take turns in occupying the A
position.
Pre-arranged signals should be employed.
195
4. Group Method
When several men are assigned to a
“group” tail, each man maintains contact
with the subject.
196
C. UNDERCOVER ASSIGNMENT OR
ROPING
Undercover Assignment- A form of
investigation in which the investigator assumes
different and unofficial identity in order to obtain
information.
Cover story – It is a biographical account, true
or fictitious, or a combination of truth or fiction
which portrays the undercover agent’s past
history, and current situation.
TYPES OF SURVEILLANCE
According to Intensity and Sensitivity
a. Discreet – subject is unaware that he/she is
under observation
b. Close – subject is aware that he/she is under
observation. Used to protect the subject or
stop him to commit crime.
c. Loose – applied frequently or infrequently.
Period of observation may vary on each
occasion
Other Forms of Surveillance:
a.Normal- distance between surveillant is
about half a block part.
b.Very Discreet- distance is just enough to
maintain visual contact with subject.
c.Strip- several teams alternating take over the
surveillance after some distance to lull target
into a false sense of security.
199
Types of Surveillance
according to Methods
200
Stationary
observation of place
usually a bookie stall,
gambling joint, or a
residence where
illegal activities are
committed (fixed
point position).
201
Moving
surveillants follow
the subject from
place to place to
maintain continuous
watch/observation of
his/her activities.
202
Technical
uses communication
and electronic
hardwares, gadgets,
systems and
equipment.
203
Special Methods of surveillance
Wire Tapping – the telephone lines is tapped
somewhere along the line, either the street
line or telephone company. The tapped lines
is run into
a recorder
which is
monitored
by the
investigator.
Concealed Microphones (bugging) – The
microphone may be concealed in the room or
maybe disguised as common object such as desk
ornament.
Eavesdropping – secretly listening to
conversations
207
1. Tape recorder – a pocket sized tape
recorder maybe concealed when recording
the conversation.
2. Television – closed circuit system maybe
used so that the activities of the subject
maybe observed by the surveillant at a
distance
Elicitation
An indirect form of interrogation
which is characterized by the
obtaining of information through
subterfuge/ trickery.
Its ultimate object is to get the
subject talking about topics of
interest to him.
209
Stake out
The observation of
places or areas from
a fixed point.
210
Plant
Similar
with
stakeout and
undercover.
211
Fixed Surveillance
Similar
with
stakeout.
212
Undercover Man
A person trained to the later reports the
observe and observation and
penetrate certain information so that
organization proper operational
suspected of illegal action can be made.
activities and
213
PRE-SURVEILLANCE
CONFERENCE
A conference held among the team
members, police intelligence unit before a
surveillance in conducted.
214
Liaison Program
This is the assignment
of trained intelligence
personnel to other
agencies in order to
obtain information of
police intelligence
value.
(Agencies like the
press, credit agencies,
labor unions,
telephone companies,
etc.)
215
Safe House
It is a place, building,
enclosed mobile, or
an apartment, where
police undercover
men meet his action
agent for debriefing
or reporting
purposes.
216
Drop
It is a convenient, DEAD LETTER
secure, and DROP – a place
unsuspecting place where a person can
where a police, hide information so
undercover man, that it can later be
informer, or informant picked up by another,
by a pre-arrangement without seeing each
leaves a note, a small other
package, an envelope
to item for the action
agent, supervisor or
another agent.
217
Contact
Any person or
subject picks or deals
with while he is
under surveillance.
218
Convoy
A countermeasure to
detect a surveillance;
Usually a person, is
employed to
determine whether
or not a subject is
under surveillance.
219
Made
AKA “burnout”
When subject under
surveillance becomes
aware that he is
under observation
and identifies the
observer
220
Burn the Surveillance
When a surveillant’s
behavior cause the
subject to surmise or
know that he or she
is under surveillance.
221
Lost
When the
surveillants do not
know the
whereabouts of their
subject or the
subject had eluded
the surveillants.
222
Subject
223
Rabbit (Hare)
Term referring to the
subject of shadowing
and tailing.
224
DEBRIEFING
– detailed who is aware of the
questioning of an questioner’s interest
agent, or of a person in intelligence
who has been matters, for the
involved in a purpose of acquiring
situation of as accurate and
intelligence complete coverage
operational interest as possible of all
and matters of
operational or
intelligence concern
225
Surveillant
Theperson
conducting the
surveillance.
226
Tail
Tofollow and
keep under
surveillance; a
surveillance.
227
Test for Tailing
The common trick of The rabbit usually
the subject (rabbit) boards a public
when he becomes conveyance then
conscious that he is jumping off the
being tailed. vehicle then he looks
about quickly to
determine if any
another person
jumps off also.
228
Tailgaiting
A form of open
surveillance in which
the subject’s vehicle
is closely followed.
229
Shadow
Tofollow secretly;
to place a person
under surveillance.
230
Tailing or Shadowing
It is the observation
of a person’s
movement.
Following the
person.
231
Technical Surveillance.
Surveillance involving
the use of scientific
device to enhance
hearing or seeing the
subject’s activities.
232
Moving Surveillance
The surveillant
moved about in
order to follow
the subject.
233
Open Surveillance
A surveillance with
little or no attempt
at concealment; also
termed rough
surveillance. The
subject is most likely
aware of the
surveillance, but must
not be lost.
234
Mustard Plaster
A form of open
surveillance;
here, the subject is
followed so closely
that surveillant and
subject are almost in
lock step.
It is tantamount to
protective custody.
235
Pen Register
A device that
records all numbers
dialed on a telephone
company’s central
office.
236
Beeper
A battery operated
device that emits
radio signals which
permit it to be
tracked by a
directional finder-
receiver. Also called
beacon, transponder,
and electronic
tracking device.
237
D. OBSERVATION AND
DESCRIPTIONS
ODEX
238
OBSERVATION
The complete and
accurate awareness
by an individual of his
surroundings and
encompasses the use
of all major senses to
register and
recognize its
operational or
intelligence
significance.
239
Psychologists estimate that
approximately:
85% of your knowledge is gathered
through sight.
13% of your hearing.
2% through the three senses
240
PSYCHOLOGICAL
ELEMENT OF OBSERVATION
attention
◦ being brought into the presence of a fact
perception
◦ ability to understand a fact to which attention
has been drawn to
report
◦ the natural tendency of an individual to
inform someone when attention and
perception occur
241
DESCRIPTION
The factual reporting
of what is observed.
Or, it is the actual
and factual reporting
of one’s observation
or the reported
sensory experience
recounted by
another.
242
CATEGORIES OF
DESCRIPTION
personality description
◦ the personal inventory of an individual
derived from his physical characteristics,
biographical data, habits and mannerism etc.
activity description
◦ description of incidents, activities or events
installation and area description
◦ casing
243
PARTS OF PERSONALITY
DESCRIPTION
general characteristics
◦ specific information about an individual (name,
age, date of birth etc)
specific characteristics
◦ information on characteristics unique to the
individual (appearance, deformities)
244
USES OF PERSONALITY
DESCRIPTION
recognition
◦ subjects of intelligence interests, suspects in
criminal activities
identification files
◦ input in a card reference for more positive
identification
identification of suspected surveillants
245
Cover and Undercover
Operation
246
Undercover Operation
an intelligence/ investigation technique
in which the investigator conceals his true
identity and
adopts an assumed role to accomplish an
intelligence/ investigation mission.
247
Types of Undercover Assignment
Dwelling Assignment-to reside in or near
the dwelling of target to maintain constant
contact with the home life of the subject.
Work Assignment- getting employed
where the investigator can observe the
activities of the subject at his place of work.
Social Assignment- frequent places of
entertainment and amusement habitually
being visited by the target.
248
Personal Contact Assignment- the
investigator is required to develop the
friendship and trust of the target.
Multiple Assignment – the investigator
is tasked to cover two or more of the
above specific assignments simultaneously;
it can produce extensive information with
minimum expenses but more prone to
compromise.
249
INFORMERS AND
INFORMANTS
Informers – Persons who give
information in return for a prize,
reward or promise.
TYPES OF INFORMERS
1. Ordinary Informers – one who openly gives
information but expect anything in return, either
money or favor.
2. Confidential Informers – one who
confidentially provides information with
understanding that his identity will not be
revealed and that he will compensate with money
or favor
Informants – Any person who gives information
without expectation of anything in return.
TYPES OF INFORMANTS
1. Voluntary informants – those who knowingly and
voluntarily provides information.
2. Involuntary informants – those who give
information even though they don’t desire of doing
so
3. Confidential informants – those who provide
information with the understanding that their
identities will not be revealed
4. Special informants –one who gives information
concerning specialized cases only and is regarded
special treatment by the operatives.
5. Anonymous – those who provide information but
refuse to divulge his identity.
OTHER TYPES OF INFORMANTS
1. Rival-elimination informants – is usually
anonymous. His purpose of supplying information
is to eliminate rival or competition.
2. False Informants – reveals information usually of
no consequences or stuff concocted of thin air.
3. Frightened informants – may be prodded with
fear or self-interest.
He may run to the
police when he sees
that his confederates
are about to be
involved in a
dangerous situation.
1. Mercenary informants – has something to sell.
He may be a valuable one. Sometimes there may
be revenge motive present.
2. Double crosser informant – uses his seeming
desire to give information as an excuse to talk to
the police in order to get more information than
he gives.
3. Legitimate informants – will include operators
of license premises who do not want their places
to be infected with criminal activities.
4. Woman informant – may be the female
associate of the criminal. She may be able to give
information, but beware with this kind of
informant because women are more deadly than
males.
Accidental Informants- a person who
casually imparts information to an officer
with no intention of providing subsequent
information
Self- aggrandizing informant- Hangs
about the fringes of the underworld and
delights in surprising the police with choice
bit of information. From time to time, his
information may be of value.
FOUR PHASES OF INFORMANT
RECRUITMENT
1. Selection – It is particularly
desirable to be able to identify and
recruit an informant who has access
to many criminal groups or subversive
organizations.
Wide access is probably the single
most importance feature in the
consideration of recruiting the
potential informant.
2.Investigation – The investigation of the potential
informants that has tentatively identified as
probable must establish possible existing motives
as to why this person might assist the police
intelligence community.
3.Approach –
Explanation of
contract.
4.Testing
GENERAL TREATMENT OF INFORMANT
1. Avoid the use of derogatory terms in
referring to informants in any type.
2. Avoid disclosing the identity of informant
which will in most cases ruin his potential.
3. Protect the interest of the informants,
remember an investigator is usually just as
good as his source of information.
4. Consider all information from known or
unknown informants as valuable until proven
otherwise.
5. Be non-committal on the value of the
information received.
6. Express appreciation to all information
received regardless of its value.
7. Keep appointment on time even though
informant may not.
8. Don't get over anxious, be patient, take your
time.
9. Keep control on the investigation.
10. Keep what you know to your self, don't
become an informant's informant.
CLANDESTINE
OPERATION
ELEMENTS OF CLANDESTINE OPERATION
* Informant Net – A controlled group of persons
who worked through the direction of the agent
handler.
A. Sponsor – directs the organization conducting
the clandestine activity
B. Target – refers to person, places or things
against which the clandestine activity is to be
used.
C. Agent – person who conducts the clandestine
operation to include the following:
1. Principal Agent – leader or management agent in
clandestine operation usually undertaken by the case
officer.
2. The Action Agent – refers to the doer of the
clandestine operation to include the following:
Espionage agent – agent who clandestinely
procure/collect information
Propagandist – agent who molds the attitude,
opinions, and actions of an individual, group or nation.
Saboteur – agent who undertakes positive action
against an unfriendly power, resulting in the loss of use
temporarily or permanently of an article, material,
facility, process or other physical resources.
Guerilla – agent who is a member of a
Para-military group organized to harass the
enemy in a hot war situation
Strong arm – agent who is made to
provide special protection during dangerous
phase of clandestine operation
Provocateur – agent who induces an
opponent to act to his own detriment by
discrediting himself or by revealing his true
purpose or identity.
Provo caper- otherwise known as
diversionist, a person who is engaged in
disruptive actions
3. Support agent – agent who is engaged in activities, which
supports the clandestine operation and or the action agent
in his operation.
Surveillant – agent who observes personnel and places fro
intelligence interest.
Investigator – agent who undertakes to procure information or
things of clandestine operation of interest.
Procurer of funds – agent who obtains special currency when
needed for operational use.
Procurer of supplies – agent who obtain supplies and he is
known as the purchasing agent, procure ordinary as well as
critical operational supplies.
Safe house keeper – agent who manages and maintains a safe
house for clandestine operational; use as meetings, safe
haven, briefing and debriefing.
Manager of Storage Area – agent who manages and arranges
storage area for distribution or transportation of operational
supplies.
Communication Agent – agent who is detailed as security of
clandestine communication
4. Other agents
1) Double Agents
Individuals who are simultaneously employed
by two opposing intelligence agencies with one
of the agencies are aware of his dual role.
2) Dual Agents
Individuals who are simultaneously and
independently employed by two or more
friendly intelligence units, and who do not
show preference for either, and normally
motivated by material gain.
265
FACTORS TO CONSIDER IN THE SELECTION
OF ACTION AGENT
1. Placement – Location of the prospective agent
with respect to the target.
2. Access – The capability or ability of the
prospective agent to obtain the desired
information for the intelligence organization or
to perform the intelligence collection mission in
the area.
a. Primary access – It has the direct access to
the desired information.
Infiltration – the insertion of action agent inside the target
organization.
Penetration – recruitment of action agent inside the target
agent.
b. Secondary access – The access to the desired
information through principal source where the
latter has the direct access.
c. Outside access – The agent is employed
outside the target and merely monitors
information from a third person who is
monitoring information in the area
4. Control – Authority to direct agent to carry out
task or the requirement in behalf of the clandestine
organization in acceptable manner.
a. Positive Control – Characterized by
professionalism and rapport.
b. Negative Control – Blackmail and threat
1. Disciplinary Action – Verbal Reprimand
2. Escrow Account – putting his salary in a bank
and to be withdrawn
only after fulfillment
of the mission.
3. Blackmail
CRYPTOGRAPHY
cryptology; from Greek
kryptos, "hidden, secret"; and ,
gráphin, "writing", or -logia, ,
"study", respectively) is the
practice and study of hiding
information.
269
CRYPTOGRAPHY
Science/ study of
encoding information
in the form of codes
and ciphers.
The act in writing in
cipher or secret
character or the
particular used.
270
Secret Codes Commonly Used by
Intelligence Officer
One-Time Pads (OTP). A One-Time Pads or
OTP is used for secret communications by just all of
the world’s major intelligence agencies.
Invisible Writing. Writing invisible messages is also
a good way of passing information between
people; a message can be written on a blank note
and passed quite naturally to another person.
Code Word. The handler can make a list of code
words that can be passed on to the agents.
Morse Code. Is just a simple substitution code
based on dashes and dots
271
Cryptography
CODES
AND
CIPHERS
Codes Ciphers
275
CIPHERS
Encoding
To convert a message to a code.
277
Decoding
Totranslate a message into ordinary
language from code.
278
Translation
The transformation/conversion of one
language to another.
279
Cryptographer
A person who is highly skilled in
converting messages from clear to
unintelligible forms by the use of
codes and ciphers.
Also known as Coder, Encrypter,
or Code Clerk.
280
Crypto Analyst
Those who break intercepted codes.
281
PERSONNEL
SECURITY
282
Most important because security
involves people, both as assets to
be protected and as source of
security threats.
It
emphasizes the need to set up a
system of hiring the people for
the company.
283
If you plan to work,
work your plan.
284
Thank you
And
Good Day !!!